The Internet works because of trust and access control. Trust that the person poking you on Facebook is really a friend. Trust that the bank that issued your credit card will let only you or authorized employees view your account. Even the anonymous parts of the Internet can't exist without security controls that enable people to determine who has access and what they can do. Without access controls, anyone can destroy the trust value of any website -- and bring it down.
In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity, with a special section on the latest developments. This Deep Dive will show you how to apply authentication, authorization, and accounting to your business computing infrastructure -- the right way.
Already an Insider? Sign in
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.